The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our goal is to maintain 1+1 path protection as much as possible after a single failure occurs for ensuring carrier-grade reliability. An obvious approach is preparing a third path that is disjoint with the primary and backup paths, but applicability to actual networks with this approach is extremely restricted. From our evaluation, the recovery ratio for reconstructing 1+1 path protection decreases...
Recently, there is a growing interest in free space optical sensor network (FSOSN) for wireless applications due to the advantages of lower energy consumption, lower cost, and larger capacity. However, the unidirectional communication of FSOSN suffers from a dramatic decrease of connectivity if certain nodes die of the depletion of energy, which further results in huge loss of packets in data transmission...
Cloud computing has emerged to provide infrastructure for cost-effectively hosting applications with dynamically changing demands for computational resources. Dynamic resource allocation in cloud computing is made possible through virtualization technologies. In addition, live migration of services hosted in virtual machines (VMs) among multiple data centers is expected to add more flexibility in...
The low cost and ease of installation of Wi-Fi equipment operating in unlicensed spectrum have made dense Wi-Fi deployments a reality in most modern urban areas. With the lack of many non-overlapping frequencies to operate on, interference among neighbor Wi-Fi cells can cause significant performance degradation. Here we study the problem of topology discovery in such dense deployments, which is necessary...
While partitioning a network for scalability and manageability purposes, we identify the significance of survivability of individual partitions. We formulate and solve “2-SRLG-connected” topology partitioning using a flexible mapping onto the physical topology.
Peer-assisted content distribution technologies have been attracting attention. By using not only server resources but also the resources of end hosts (i.e., peers), we can reduce the offered load on servers as well as utilization of the access bandwidth of the servers. However, offered traffi to the network may increase because the traffi exchanged between peers passes across the network. Specificall,...
This paper reports the demonstration results of the dynamic link power management by energy optimal network topology design with prototype Gigabit layer-2 switches. The result shows dynamic link power management is feasible.
The aggregate capacity of wireless mesh networks is severely affected by interflow interference. Directional antennas and multiple channels are two well known techniques which can be applied to mitigate interflow interference. In this work, a network architecture is proposed to incorporate directional antennas with multiple orthogonal channels effectively to enhance the performance of wireless mesh...
The long-thin (LT) network topology is promoted for many deployments of wireless sensor networks (WSNs) due to the application requirements. An LT topology consists of long branches of sensors, where each sensor has only one potential parent toward the sink. Data aggregation may help reduce excessive packet contention, but constraints imposed by the maximum payload size of each packet severely limit...
We present a novel topology control algorithm for very dense wireless sensor networks that is constrained by a small maximum nodal degree k. Particularly, we limit k = 4 which makes it challenging to formulate a connected network that possesses favorable properties such as a small diameter, short average path length and low energy consumption. Towards this goal, we introduce a graph theoretic approach...
In wireless sensor networks (WSNs), sensor nodes are typically subjected to energy constraints and often prone to topology changes. While duty cycling has been widely used for energy conservation in WSNs, random walks have been popular for many delay-tolerant applications in WSNs due to their many inherent desirable properties. In this paper, we consider an opportunistic forwarding under an asynchronous...
Constructing a router-level topology map of an IPv6 network is important for understanding the internal properties of IPv6 networks, building new applications, network management, etc. However, the well-known topology discovery tool, traceroute6, can only obtain interface-level topology information, which creates a significant problem known as IPv6 alias resolution. Though the inaccuracy and incompleteness...
Peer-to-peer botnets formed by worm infection have become a real threat to the Internet and are expected to become rampant in the near future. In our previous work, we have analyzed the underlying botnet topology formed by worm infection, without considering potential user defenses. In this paper, we extend the study to characterize the evolution of the botnet structure when users patch or clean part...
We consider the use of a relay to provide capacity improvements and range extension for in-home power line communication networks. In particular, we focus on opportunistic relaying where the relay is exploited only if it provides improved capacity w.r.t. the use of direct transmission between the source and the destination. The relay applies a decode and forward scheme and the channel is shared in...
When shortest path routing is employed in large scale multi-hop wireless networks, nodes located near the center of the network have to perform disproportionate amount of relaying for others. To solve the problem, various divergent routing schemes are used which route the data on center-avoiding divergent routing paths. Though they achieve better load balancing, overall relaying is increased significantly...
An incremental capacity allocation with topology augmentation problem is investigated to maximize the number of backup path provisioned services in WDM mesh networks. Numerical results show that all the services can be provisioned a backup path with little number of new links added to the existing topology.
The goal of WDM network reconfiguration is to accommodate more traffic demands, as well as to optimize network operations such as cost minimization or utilization maximization. This tutorial reviews the WDM network reconfiguration strategies and triggering methods, followed by an overview of WDN network reconfiguration optimization and topology migration methods.
Realistic network topologies are crucial for network research and are commonly used for the analysis, simulation, and evaluation of various mechanisms and protocols. In this paper, we discuss network topology models to generate physical topologies for backbone networks. In order to gain better understanding of current topologies and engineer networks for the future, it is necessary to generate realistic...
Research activities have recently begun on the integration of Peer-to-Peer (P2P) principles into the Session Initiation Protocol (SIP). We have contributed to these activities by proposing a P2P SIP architecture where the SIP location service is not managed by the P2P overlay but integrated in proxies that run over peer entities in the P2P overlay. Having SIP proxies as first-class entities, raises...
Multicast has been being developed as a very promising technique to data delivery to a group of destinations simultaneously. Except of first implementation for multicasting in the Internet aka IP Multicast, for past few years some systems defined for end-hosts overlay network have been successfully designed and implemented. Additionally, overlay multicast defined for end-host based networks has been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.